Unlock instant, AI-driven research and patent intelligence for your innovation.

Dynamic reconfiguration of encryption upon detection of intrusion

A technology of data and secret keys, applied in the direction of data exchange through path configuration, security devices, data exchange networks, etc.

Inactive Publication Date: 2005-03-02
TREND MICRO INC
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Thus, all encrypted wireless transmissions within the LAN can be eavesdropped and decrypted

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dynamic reconfiguration of encryption upon detection of intrusion
  • Dynamic reconfiguration of encryption upon detection of intrusion
  • Dynamic reconfiguration of encryption upon detection of intrusion

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] see figure 1 , in order to illustrate the present invention, the general situation of a wireless LAN and its interconnection with a network such as the Internet or the World Wide Web (Web) is shown in the figure. The wireless LAN is limited to an area 11 of one facility. The LAN includes wireless devices such as PCs 13 or personal digital assistants that transmit and receive radio frequency communications 15 via their respective antennas 23 via corresponding antennas 23 of an IEEE 802.11B protocol wireless hub 19, which The wireless hub 19 has an associated web server containing a secret key encryption routine (ENC) 21 for encrypting and decrypting wireless communications within the LAN so that the wireless communications are encrypted during wireless transmission within the LAN . A LAN server within the hub 19 communicates with the Internet 50 , for example via a suitable communication link 49 . Suppose an intruder's truck 25 is cruising the route 27 around the peri...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention involves the recognition that since an eavesdropper listening adjacent to a wireless LAN is likely to be mobile and operating on a short time cycle, he himself is likely to be wirelessly transmitting his test message. Consequently, the present invention provides the combination of apparatus for eavesdropping within an area layer adjacent to and surrounding the LAN area periphery for potential wireless transmissions of an intruder having a lower frequency within a level below the LAN frequency and addressed to the network location of any one of the computer terminals in the LAN; and an implementation responsive to said eavesdropping means for changing the encryption code of said encrypted wireless transmission upon the eavesdropping detection of a wireless transmission of said lower frequency addressed to a network location of one of the terminals in said LAN. There is the recognition that there are several factors contributing to the success of the process of the invention. It is likely that the intruder must send his message at a lower frequency than the 2.4 GHz frequency of the LAN area transmissions because the intruder will probably have to reach a base station tower over a longer distance or range than the adjacent target wireless LAN facility. This insures that the eavesdropping of the present invention will be at a lower frequency and, thus, not interfered with by the transmissions within the LAN.

Description

technical field [0001] The present invention relates to the technology of protecting wireless communication, especially local area network (LAN) communication from illegal intrusion by listening devices. Background technique [0002] A local area network that uses radio waves for non-directional transmission of data and protocols is called a wireless LAN. The term "wireless" is not a complete description, because these networks simply reduce the wiring required to form a LAN. A wireless LAN may be more properly described as a local area network in which a portion of communication is wireless. This has come with the amazing development of wireless communication products including cellular telephones, wireless personal computers and similar devices. Thus, a wireless LAN is typically a geographically defined facility, such as a business and manufacturing site, a university campus, or a government facility, where workers can disconnect from the network and move around unrestri...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/16H04L12/28H04L12/56H04L29/06H04W12/02H04W84/12
CPCH04W12/12H04W12/02H04L63/1475H04L63/0428H04W84/12H04W12/03H04W12/121
Inventor G·F·麦克布瑞尔蒂S·P·马伦J·M-H·谢J·S·泰绍罗
Owner TREND MICRO INC